Could you please check if my solution is correct? a) Forwarding table of Bridge 1 at a time =14ec Assuming that Bridge 1 has not learned any addresses yet, its forwarding table at time 14 sec would be: MAC Address Port Station A 1 Station B 2 Station C 3 b) Assuming that Bridge 3 has not learned any addresses yet, its forwarding table at time 28 sec would be: MAC Address Port Station A 2 Station B 1 Station C 3 c) At time 5 sec, Station C sends a frame to Station B. The transmission would be seen on segments C, E, F, G, and H d) At time 20 sec, Station A sends a frame to Station C. The transmission would be seen on segments A, B, D, and F.

Operations Research : Applications and Algorithms
4th Edition
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Wayne L. Winston
Chapter20: Queuing Theory
Section20.10: Exponential Queues In Series And Open Queuing Networks
Problem 8P
icon
Related questions
Question

Could you please check if my solution is correct?

  1. a) Forwarding table of Bridge 1 at a time =14ec

Assuming that Bridge 1 has not learned any addresses yet, its forwarding table at time 14 sec would be:

MAC Address

Port

Station A

1

Station B

2

Station C

3

 

  1. b) Assuming that Bridge 3 has not learned any addresses yet, its forwarding table at time 28 sec would be:

MAC Address

Port

Station A

2

Station B

1

Station C

3

 

  1. c) At time 5 sec, Station C sends a frame to Station B. The transmission would be seen on segments C, E, F, G, and H

 

  1. d) At time 20 sec, Station A sends a frame to Station C. The transmission would be seen on segments A, B, D, and F.



Question 4:
Consider the network shown in Figure 1 below, where all the segments (A, B, ..., J) are 100Mbps shared Ethernet. Assuming that the network bridges (B1 to B7) have not learnt any addresses yet, the following sequence of events occur at the times indicated, where time = 0 is the time at which the network is ready for
forwarding. There is no other traffic on the network.
Time
1 sec
5 sec
10 sec
15 sec
20 sec
25 sec
Answer the following questions.
a) Show the forwarding table of Bridge 1 at time = 14 sec
b) Show the forwarding table of Bridge 3 at time = 28 sec
c) List the segments on which the transmission at time = 5 sec is seen
d) List the segments on which the transmission at time = 20 sec is seen
Note that the loops have to be removed before learning and forwarding happen.
‒‒‒‒‒‒‒‒‒‒‒
Therefore, the tree to be considered is the one obtained after the spanning tree protocol
converges (see Module 10 Lesson Plan).
C
Event
Station A sends a frame to Station B
Station C sends a frame to Station B
Station B replies to station C
Station B replies to station A
Station A sends a frame to Station C
Station C sends a frame to Station A
E
G
B2
B3
Port 2
Port 1
B6
Station C
Station A
B1
B5
Station B
B4
B7
Port 3
Port 2
Port 1
F
H
B
K
Table 1
Transcribed Image Text:Question 4: Consider the network shown in Figure 1 below, where all the segments (A, B, ..., J) are 100Mbps shared Ethernet. Assuming that the network bridges (B1 to B7) have not learnt any addresses yet, the following sequence of events occur at the times indicated, where time = 0 is the time at which the network is ready for forwarding. There is no other traffic on the network. Time 1 sec 5 sec 10 sec 15 sec 20 sec 25 sec Answer the following questions. a) Show the forwarding table of Bridge 1 at time = 14 sec b) Show the forwarding table of Bridge 3 at time = 28 sec c) List the segments on which the transmission at time = 5 sec is seen d) List the segments on which the transmission at time = 20 sec is seen Note that the loops have to be removed before learning and forwarding happen. ‒‒‒‒‒‒‒‒‒‒‒ Therefore, the tree to be considered is the one obtained after the spanning tree protocol converges (see Module 10 Lesson Plan). C Event Station A sends a frame to Station B Station C sends a frame to Station B Station B replies to station C Station B replies to station A Station A sends a frame to Station C Station C sends a frame to Station A E G B2 B3 Port 2 Port 1 B6 Station C Station A B1 B5 Station B B4 B7 Port 3 Port 2 Port 1 F H B K Table 1
Expert Solution
steps

Step by step

Solved in 7 steps

Blurred answer
Knowledge Booster
Types of Security Technology
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Operations Research : Applications and Algorithms
Operations Research : Applications and Algorithms
Computer Science
ISBN:
9780534380588
Author:
Wayne L. Winston
Publisher:
Brooks Cole
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning